Search results for: secure communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1220

Search results for: secure communications

110 Informational Habits and Ideology as Predictors for Political Efficacy: A Survey Study of the Brazilian Political Context

Authors: Pedro Cardoso Alves, Ana Lucia Galinkin, José Carlos Ribeiro

Abstract:

Political participation, can be a somewhat tricky subject to define, not in small part due to the constant changes in the concept fruit of the effort to include new forms of participatory behavior that go beyond traditional institutional channels. With the advent of the internet and mobile technologies, defining political participation has become an even more complicated endeavor, given de amplitude of politicized behaviors that are expressed throughout these mediums, be it in the very organization of social movements, in the propagation of politicized texts, videos and images, or in the micropolitical behaviors that are expressed in daily interaction. In fact, the very frontiers that delimit physical and digital spaces have become ever more diluted due to technological advancements, leading to a hybrid existence that is simultaneously physical and digital, not limited, as it once was, to the temporal limitations of classic communications. Moving away from those institutionalized actions of traditional political behavior, an idea of constant and fluid participation, which occurs in our daily lives through conversations, posts, tweets and other digital forms of expression, is discussed. This discussion focuses on the factors that precede more direct forms of political participation, interpreting the relation between informational habits, ideology, and political efficacy. Though some of the informational habits can be considered political participation, by some authors, a distinction is made to establish a logical flow of behaviors leading to participation, that is, one must gather and process information before acting on it. To reach this objective, a quantitative survey is currently being applied in Brazilian social media, evaluating feelings of political efficacy, social and economic issue-based ideological stances and informational habits pertaining to collection, fact-checking, and diversity of sources and ideological positions present in the participant’s political information network. The measure being used for informational habits relies strongly on a mix of information literacy and political sophistication concepts, bringing a more up-to-date understanding of information and knowledge production and processing in contemporary hybrid (physical-digital) environments. Though data is still being collected, preliminary analysis point towards a strong correlation between information habits and political efficacy, while ideology shows a weaker influence over efficacy. Moreover, social ideology and economic ideology seem to have a strong correlation in the sample, such intermingling between social and economic ideals is generally considered a red flag for political polarization.

Keywords: political efficacy, ideology, information literacy, cyberpolitics

Procedia PDF Downloads 221
109 Comparative Quantitative Study on Learning Outcomes of Major Study Groups of an Information and Communication Technology Bachelor Educational Program

Authors: Kari Björn, Mikael Soini

Abstract:

Higher Education system reforms, especially Finnish system of Universities of Applied Sciences in 2014 are discussed. The new steering model is based on major legislative changes, output-oriented funding and open information. The governmental steering reform, especially the financial model and the resulting institutional level responses, such as a curriculum reforms are discussed, focusing especially in engineering programs. The paper is motivated by management need to establish objective steering-related performance indicators and to apply them consistently across all educational programs. The close relationship to governmental steering and funding model imply that internally derived indicators can be directly applied. Metropolia University of Applied Sciences (MUAS) as a case institution is briefly introduced, focusing on engineering education in Information and Communications Technology (ICT), and its related programs. The reform forced consolidation of previously separate smaller programs into fewer units of student application. New curriculum ICT students have a common first year before they apply for a Major. A framework of parallel and longitudinal comparisons is introduced and used across Majors in two campuses. The new externally introduced performance criteria are applied internally on ICT Majors using data ex-ante and ex-post of program merger.  A comparative performance of the Majors after completion of joint first year is established, focusing on previously omitted Majors for completeness of analysis. Some new research questions resulting from transfer of Majors between campuses and quota setting are discussed. Practical orientation identifies best practices to share or targets needing most attention for improvement. This level of analysis is directly applicable at student group and teaching team level, where corrective actions are possible, when identified. The analysis is quantitative and the nature of the corrective actions are not discussed. Causal relationships and factor analysis are omitted, because campuses, their staff and various pedagogical implementation details contain still too many undetermined factors for our limited data. Such qualitative analysis is left for further research. Further study must, however, be guided by the relevance of the observations.

Keywords: engineering education, integrated curriculum, learning outcomes, performance measurement

Procedia PDF Downloads 218
108 Mothers’ Experiences of Continuing Their Pregnancy after Prenatally Receiving a Diagnosis of Down Syndrome

Authors: Sevinj Asgarova

Abstract:

Within the last few decades, major advances in the field of prenatal testing have transpired yet little research regarding the experiences of mothers who chose to continue their pregnancies after prenatally receiving a diagnosis of Down Syndrome (DS) has been undertaken. Using social constructionism and interpretive description, this retrospective research study explores this topic from the point of view of the mothers involved and provides insight as to how the experience could be improved. Using purposive sampling, 23 mothers were recruited from British Columbia (n=11) and Ontario (n=12) in Canada. Data retrieved through semi-structured in-depth interviews were analyzed using inductive, constant comparative analysis, the major analytical techniques of interpretive description. Four primary phases emerged from the data analysis 1) healthcare professional-mothers communications, 2) initial emotional response, 3) subsequent decision-making and 4) an adjustment and reorganization of lifestyle to the preparation for the birth of the child. This study validates the individualized and contextualized nature of mothers’ decisions as influenced by multiple factors, with moral values/spiritual beliefs being significant. The mothers’ ability to cope was affected by the information communicated to them about their unborn baby’s diagnosis and the manner in which that information was delivered to them. Mothers used emotional coping strategies, dependent upon support from partners, family, and friends, as well as from other families who have children with DS. Additionally, they employed practical coping strategies, such as engaging in healthcare planning, seeking relevant information, and reimagining and reorganizing their lifestyle. Over time many families gained a sense of control over their situation and readjusted to the preparation for the birth of the child. Many mothers expressed the importance of maintaining positivity and hopefulness with respect to positive outcomes and opportunities for their children. The comprehensive information generated through this study will also provide healthcare professionals with relevant information to assist them in understanding the informational and emotional needs of these mothers. This should lead to an improvement in their practice and enhance their ability to intervene appropriately and effectively, better offering improved support to parents dealing with a diagnosis of DS for their child.

Keywords: continuing affected pregnancy, decision making, disability, down syndrome, eugenic social attitudes, inequalities, life change events, prenatal care, prenatal testing, qualitative research, social change, social justice

Procedia PDF Downloads 87
107 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 240
106 Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh

Authors: Mohammad Ashraful Alam, Biro Judit

Abstract:

Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh.

Keywords: compromise personal freedom, fear of crime, fear of gender-based crime, fear of violent crime victimization, rape, sexual assaults, withdrawal from regular activities, women empowerment

Procedia PDF Downloads 121
105 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 126
104 Perception of Corporate Social Responsibility and Enhancing Compassion at Work through Sense of Meaningfulness

Authors: Nikeshala Weerasekara, Roshan Ajward

Abstract:

Contemporary business environment, given the circumstance of stringent scrutiny toward corporate behavior, organizations are under pressure to develop and implement solid overarching Corporate Social Responsibility (CSR) strategies. In that milieu, in order to differentiate themselves from competitors and maintain stakeholder confidence banks spend millions of dollars on CSR programmes. However, knowledge on how non-western bank employees perceive such activities is inconclusive. At the same time recently only researchers have shifted their focus on positive effects of compassion at work or the organizational conditions under which it arises. Nevertheless, mediation mechanisms between CSR and compassion at work have not been adequately examined leaving a vacuum to be explored. Despite finding a purpose in work that is greater than extrinsic outcomes of the work is important to employees, meaningful work has not been examined adequately. Thus, in addition to examining the direct relationship between CSR and compassion at work, this study examined the mediating capability of meaningful work between these variables. Specifically, the researcher explored how CSR enables employees to sense work as meaningful which in turn would enhance their level of compassion at work. Hypotheses were developed to examine the direct relationship between CSR and compassion at work and the mediating effect of meaningful work on the relationship between CSR and compassion at work. Both Social Identity Theory (SIT) and Social Exchange Theory (SET) were used to theoretically support the relationships. The sample comprised of 450 respondents covering different levels of the bank. A convenience sampling strategy was used to secure responses from 13 local licensed commercial banks in Sri Lanka. Data was collected using a structured questionnaire which was developed based on a comprehensive review of literature and refined using both expert opinions and a pilot survey. Structural equation modeling using Smart Partial Least Square (PLS) was utilized for data analysis. Findings indicate a positive and significant (p < .05) relationship between CSR and compassion at work. Also, it was found that meaningful work partially mediates the relationship between CSR and compassion at work. As per the findings it is concluded that bank employees’ perception of CSR engagement not only directly influence compassion at work but also impact such through meaningful work as well. This implies that employees consider working for a socially responsible bank since it creates greater meaningfulness of work to retain with the organization, which in turn trigger higher level of compassion at work. By utilizing both SIT and SET in explaining relationships between CSR and compassion at work it amounts to theoretical significance of the study. Enhance existing literature on CSR and compassion at work. Also, adds insights on mediating capability of psychologically related variables such as meaningful work. This study is expected to have significant policy implications in terms of increasing compassion at work where managers must understand the importance of including CSR activities into their strategy in order to thrive. Finally, it provides evidence of suitability of using Smart PLS to test models with mediating relationships involving non normal data.

Keywords: compassion at work, corporate social responsibility, employee commitment, meaningful work, positive affect

Procedia PDF Downloads 110
103 Migrants as Change Agents: A Study of Social Remittances between Finland and Russia

Authors: Ilona Bontenbal

Abstract:

In this research, the potential for societal change is researched through the idea of migrants as change agents. The viewpoint is on the potential that migrants have for affecting societal change in their country of origin through transmitting transnational peer-to-peer information. The focus is on the information that Russian migrants living in Finland transmit about their experiences and attitudes regarding the Nordic welfare state, its democratic foundation and the social rights embedded in it, to their family and friends in their country of origin. The welfare provision and level of democracy are very different in the two neighbouring countries of Finland and Russia. Finland is a Nordic welfare state with strong democratic institutions and a comprehensive actualizing of civil and social rights. In Russia, the state of democracy has on the other hand been declining, and the social and civil rights of its citizens are constantly undermined. Due to improvements in communications and travel technology, migrants can easily and relatively cheaply stay in contact with their family and friends in their country of origin. This is why it is possible for migrants to act as change agents. By telling about their experiences and attitudes about living in a democratic welfare state, migrants can affect what people in the country or origin know and think about welfare, democracy, and social rights. This phenomenon is approached through the concept of social remittances. Social remittances broadly stand for the ideas, know-how, world views, attitudes, norms of behavior, and social capital that flows through transnational networks from receiving- to sending- country communities and the other way around. The viewpoint is that historically and culturally formed democratic welfare models cannot be copied entirely nor that each country should achieve identical development paths, but rather that migrants themselves choose which aspects they see as important to remit to their acquaintances in their country of origin. This way the potential for social change and the agency of the migrants is accentuated. The empirical research material of this study is based on 30 qualitative interviews with Russian migrants living in Finland. Russians are the largest migrant group in Finland and Finland is a popular migration destination especially for individuals living in North-West Russia including the St. Petersburg region. The interviews are carried out in 2018-2019. The preliminary results indicate that Russian migrants discuss social rights and welfare a lot with their family members and acquaintances living in Russia. In general, the migrants feel that they have had an effect on the way that their friends and family think about Finland, the West, social rights and welfare provision. Democracy, on the other hand, is seen as a more difficult and less discussed topic. The transformative potential that the transmitted information and attitudes could have outside of the immediate circle of acquaintances on larger societal change is seen as ambiguous although not negligible.

Keywords: migrants as change agents, Russian migrants, social remittances, welfare and democracy

Procedia PDF Downloads 169
102 A Case of Borderline Personality Disorder: An Explanatory Study of Unconscious Conflicts through Dream-Analysis

Authors: Mariam Anwaar, Kiran B. Ahmad

Abstract:

Borderline Personality Disorder (BPD) is an invasive presence of affect instability, disturbance in self-concept and attachment in relationships. The profound indicator is the dichotomous approach of the world in which the ego categorizes individuals, especially their significant others, into secure or threatful beings, leaving little room for a complex combination of characteristics in one person. This defense mechanism of splitting their world has been described through the explanatory model of unconscious conflict theorized by Sigmund Freud’s Electra Complex in the Phallic Stage. The central role is of the father with whom the daughter experiences penis envy, thus identifying with the mother’s characteristics to receive the father’s attention. However, Margret Mahler, an object relation theorist, elucidates the central role of the mother and that the split occurs during the pre-Electra complex stage. Amid the 14 and 24 months of the infant, it acknowledges the world away from the mother as they have developed milestones such as crawling. In such novelty, the infant crawls away from the mother creating a sense of independence (individuation). On the other hand, being distant causes anxiety, making them return to their original object of security (separation). In BPD, the separation-individuation stage is disrupted, due to contradictory actions of the caregiver, which results in splitting the object into negative and positive aspects, repressing the former and adhering to the latter for survival. Thus, with time, the ego distorts the reality into dichotomous categories, using the splitting defenses, and the mental representation of the self is distorted due to the internalization of the negative objects. The explanatory model was recognized in the case study of Fizza, at 21-year-old Pakistani female, residing in Karachi. Her marital status is single with an occupation being a dental student. Fizza lives in a nuclear family but is surrounded by her extended family as they all are in close vicinity. She came with the complaints of depressive symptoms for two-years along with self-harm due to severe family conflicts. Through the intervention of Dialectical Behavior Therapy (DBT), the self-harming actions were reduced, however, this libidinal energy transformed into claustrophobic symptoms and, along with this, Fizza has always experienced vivid dreams. A retrospective method of Jungian dream-analysis was applied to locate the origins of the splitting in the unconscious. The result was the revelation of a sexual harassment trauma at the age of six-years which was displaced in the form of self-harm. In addition to this, the presence of a conflict at the separation-individuation stage was detected during the dream-analysis, and it was the underlying explanation of the claustrophobic symptoms. This qualitative case study implicates the use of a patient’s subjective experiences, such as dreams, to journey through the spiral of the unconscious in order to not only detect repressed memories but to use them in psychotherapy as a means of healing the patient.

Keywords: borderline personality disorder, dream-analysis, Electra complex, separation-individuation, splitting, unconscious

Procedia PDF Downloads 140
101 Expanding the Atelier: Design Lead Academic Project Using Immersive User-Generated Mobile Images and Augmented Reality

Authors: David Sinfield, Thomas Cochrane, Marcos Steagall

Abstract:

While there is much hype around the potential and development of mobile virtual reality (VR), the two key critical success factors are the ease of user experience and the development of a simple user-generated content ecosystem. Educational technology history is littered with the debris of over-hyped revolutionary new technologies that failed to gain mainstream adoption or were quickly superseded. Examples include 3D television, interactive CDROMs, Second Life, and Google Glasses. However, we argue that this is the result of curriculum design that substitutes new technologies into pre-existing pedagogical strategies that are focused upon teacher-delivered content rather than exploring new pedagogical strategies that enable student-determined learning or heutagogy. Visual Communication design based learning such as Graphic Design, Illustration, Photography and Design process is heavily based on the traditional forms of the classroom environment whereby student interaction takes place both at peer level and indeed teacher based feedback. In doing so, this makes for a healthy creative learning environment, but does raise other issue in terms of student to teacher learning ratios and reduced contact time. Such issues arise when students are away from the classroom and cannot interact with their peers and teachers and thus we see a decline in creative work from the student. Using AR and VR as a means of stimulating the students and to think beyond the limitation of the studio based classroom this paper will discuss the outcomes of a student project considering the virtual classroom and the techniques involved. The Atelier learning environment is especially suited to the Visual Communication model as it deals with the creative processing of ideas that needs to be shared in a collaborative manner. This has proven to have been a successful model over the years, in the traditional form of design education, but has more recently seen a shift in thinking as we move into a more digital model of learning and indeed away from the classical classroom structure. This study focuses on the outcomes of a student design project that employed Augmented Reality and Virtual Reality technologies in order to expand the dimensions of the classroom beyond its physical limits. Augmented Reality when integrated into the learning experience can improve the learning motivation and engagement of students. This paper will outline some of the processes used and the findings from the semester-long project that took place.

Keywords: augmented reality, blogging, design in community, enhanced learning and teaching, graphic design, new technologies, virtual reality, visual communications

Procedia PDF Downloads 227
100 Impact of Weather Conditions on Non-Food Retailers and Implications for Marketing Activities

Authors: Noriyuki Suyama

Abstract:

This paper discusses purchasing behavior in retail stores, with a particular focus on the impact of weather changes on customers' purchasing behavior. Weather conditions are one of the factors that greatly affect the management and operation of retail stores. However, there is very little research on the relationship between weather conditions and marketing from an academic perspective, although there is some importance from a practical standpoint and knowledge based on experience. For example, customers are more hesitant to go out when it rains than when it is sunny, and they may postpone purchases or buy only the minimum necessary items even if they do go out. It is not difficult to imagine that weather has a significant impact on consumer behavior. To the best of the authors' knowledge, there have been only a few studies that have delved into the purchasing behavior of individual customers. According to Hirata (2018), the economic impact of weather in the United States is estimated to be 3.4% of GDP, or "$485 billion ± $240 billion per year. However, weather data is not yet fully utilized. Representative industries include transportation-related industries (e.g., airlines, shipping, roads, railroads), leisure-related industries (e.g., leisure facilities, event organizers), energy and infrastructure-related industries (e.g., construction, factories, electricity and gas), agriculture-related industries (e.g., agricultural organizations, producers), and retail-related industries (e.g., retail, food service, convenience stores, etc.). This paper focuses on the retail industry and advances research on weather. The first reason is that, as far as the author has investigated the retail industry, only grocery retailers use temperature, rainfall, wind, weather, and humidity as parameters for their products, and there are very few examples of academic use in other retail industries. Second, according to NBL's "Toward Data Utilization Starting from Consumer Contact Points in the Retail Industry," labor productivity in the retail industry is very low compared to other industries. According to Hirata (2018) mentioned above, improving labor productivity in the retail industry is recognized as a major challenge. On the other hand, according to the "Survey and Research on Measurement Methods for Information Distribution and Accumulation (2013)" by the Ministry of Internal Affairs and Communications, the amount of data accumulated by each industry is extremely large in the retail industry, so new applications are expected by analyzing these data together with weather data. Third, there is currently a wealth of weather-related information available. There are, for example, companies such as WeatherNews, Inc. that make weather information their business and not only disseminate weather information but also disseminate information that supports businesses in various industries. Despite the wide range of influences that weather has on business, the impact of weather has not been a subject of research in the retail industry, where business models need to be imagined, especially from a micro perspective. In this paper, the author discuss the important aspects of the impact of weather on marketing strategies in the non-food retail industry.

Keywords: consumer behavior, weather marketing, marketing science, big data, retail marketing

Procedia PDF Downloads 60
99 Determinants of Domestic Violence among Married Women Aged 15-49 Years in Sierra Leone by an Intimate Partner: A Cross-Sectional Study

Authors: Tesfaldet Mekonnen Estifanos, Chen Hui, Afewerki Weldezgi

Abstract:

Background: Intimate partner violence (hereafter IPV) is a major global public health challenge that tortures and disables women in the place where they are ought to be most secure within their own families. The fact that the family unit is commonly viewed as a private circle, violent acts towards women remains undermined. There are limited research and knowledge about the influencing factors linked to IPV in Sierra Leone. This study, therefore, estimates the prevalence rate and the predicting factors associated with IPV. Methods: Data were taken from Sierra-Leone Demographic and Health Survey (SDHS, 2013): the first in its form to incorporate information on domestic violence. Multistage cluster sampling research design was used, and information was gathered by a standard questionnaire. A total of 5185 respondents selected were interviewed, out of whom 870 were never been in union, thus excluded. To analyze the two dependent variables: experience of IPV, ‘ever’ and 'last 12 months prior to the survey', a total of 4315 (currently or formerly married) and 4029 women (currently in union) were included respectively. These dependent variables were constructed from the three forms of violence namely physical, emotional and sexual. Data analysis was applied using SPSS version 23, comprising three-step process. First, descriptive statistics were used to show the frequency distribution of both the outcome and explanatory variables. Second, bivariate analysis adopting chi-square test was applied to assess the individual relationship between the outcome and explanatory variables. Third, multivariate logistic regression analysis was undertaken using hierarchical modeling strategy to identify the influence of the explanatory variables on the outcome variables. Odds ratio (OR) and 95% confidence interval (CI) were utilized to examine the association of the variables considering p-values less than 0.05 statistically significant. Results: The prevalence of lifetime IPV among ever married women was 48.4%, while 39.8% of those currently married experienced IPV in the previous year preceding the survey. Women having 1 to 4 and more than 5 number of ever born babies were almost certain to encounter lifetime IPV. However, women who own a property, and those who referenced 3-5 reasons for which wife-beating is acceptable were less probably to experience lifetime IPV. Attesting parental violence, partner’s dominant marital behavior, and women afraid of their partner were the variables related to both experience of IPV ‘ever’ and ‘the previous year prior to the survey’. Respondents who concur that wife-beating is sensible in certain situations and occupations under the professional category had diminished chances of revealing IPV in the year prior to the data collection. Conclusion: This study indicated that factors significantly correlated with IPV in Sierra-Leone are mostly linked with husband related factors specifically, marital controlling behaviors. Addressing IPV in Sierra-Leone requires joint efforts that target men raise awareness to address controlling behavior and empower security in affiliations.

Keywords: husband behavior, married women, partner violence, Sierra Leone

Procedia PDF Downloads 117
98 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 215
97 The Use of Information and Communication Technology within and between Emergency Medical Teams during a Disaster: A Qualitative study

Authors: Badryah Alshehri, Kevin Gormley, Gillian Prue, Karen McCutcheon

Abstract:

In a disaster event, sharing patient information between the pre-hospital Emergency Medical Services (EMS) and Emergency Department (ED) hospitals is a complex process during which important information may be altered or lost due to poor communication. The aim of this study was to critically discuss the current evidence base in relation to communication between pre- EMS hospital and ED hospital professionals by the use of Information and Communication Systems (ICT). This study followed the systematic approach; six electronic databases were searched: CINAHL, Medline, Embase, PubMed, Web of Science, and IEEE Xplore Digital Library were comprehensively searched in January 2018 and a second search was completed in April 2020 to capture more recent publications. The study selection process was undertaken independently by the study authors. Both qualitative and quantitative studies were chosen that focused on factors that are positively or negatively associated with coordinated communication between pre-hospital EMS and ED teams in a disaster event. These studies were assessed for quality, and the data were analyzed according to the key screening themes which emerged from the literature search. Twenty-two studies were included. Eleven studies employed quantitative methods, seven studies used qualitative methods, and four studies used mixed methods. Four themes emerged on communication between EMTs (pre-hospital EMS and ED staff) in a disaster event using the ICT. (1) Disaster preparedness plans and coordination. This theme reported that disaster plans are in place in hospitals, and in some cases, there are interagency agreements with pre-hospital and relevant stakeholders. However, the findings showed that the disaster plans highlighted in these studies lacked information regarding coordinated communications within and between the pre-hospital and hospital. (2) Communication systems used in the disaster. This theme highlighted that although various communication systems are used between and within hospitals and pre-hospitals, technical issues have influenced communication between teams during disasters. (3) Integrated information management systems. This theme suggested the need for an integrated health information system that can help pre-hospital and hospital staff to record patient data and ensure the data is shared. (4) Disaster training and drills. While some studies analyzed disaster drills and training, the majority of these studies were focused on hospital departments other than EMTs. These studies suggest the need for simulation disaster training and drills, including EMTs. This review demonstrates that considerable gaps remain in the understanding of the communication between the EMS and ED hospital staff in relation to response in disasters. The review shows that although different types of ICTs are used, various issues remain which affect coordinated communication among the relevant professionals.

Keywords: emergency medical teams, communication, information and communication technologies, disaster

Procedia PDF Downloads 113
96 Learning from the Positive to Encourage Compliance with Workplace Health and Safety

Authors: Amy Williamson, Kerry Armstrong, Jason Edwards, Patricia Obst

Abstract:

Australian national policy endorses a responsive approach to work health and safety (WHS) regulation, combining positive motivators (education and guidance), with compliance monitoring and enforcement to encourage and secure compliance with legislation. Despite theoretical support for responsive regulation, there is limited evidence regarding how to achieve best results in practice. Using positive psychology as a novel paradigm, this study aims to investigate how non-punitive regulatory interactions can be improved to further encourage regulatory compliance in the construction industry. As part of a larger project, semi-structured interviews were conducted with 35 inspectorate staff and 11 managers in the Australian (Queensland) construction industry. Using an inductive, grounded approach, an in-depth qualitative investigation was conducted to identify the positive psychological principles which underpin effective use of the non-punitive aspects of responsive regulation. Results highlighted the importance of effective engagement between inspectors and industry managers. This involved the need to interact cooperatively and encourage compliance with WHS legislation. Several strategies were identified that assisted regulatory interactions and the ability of inspectors to engage. The importance of communication and interpersonal skills was reported to be critical to any interaction, regardless of the nature of the visit and regulatory tools used. In particular, the use of clear and open communication fostered trust and rapport which facilitated more positive interactions. The importance of respect and empathy was also highlighted. The need for provision of guidance and direction on how to achieve compliance was also reported. This related to ensuring companies understand their WHS obligations, providing specific advice regarding how to rectify a breach and meet compliance requirements, and ensuring sufficient follow up to confirm that compliance is successfully achieved. In the absence of imminent risk, allowing companies the opportunity to comply before further action is taken was also highlighted. Increased proactive engagement with industry to educate and promote the vision of safety at work was also reported. Finally, provision of praise and positive feedback was reported to assist interactions and encourage the continuation of good practices. Evidence from positive psychology and organisational psychology was obtained to support the use of each strategy in practice. In particular, the area of positive leadership provided a useful framework to consider the factors and conditions that drive positive interactions within the context of work health and safety and the specific relationship between inspectors and industry managers. This study provides fresh insight into key psychological principles which support non-punitive regulatory interactions in the area of workplace health and safety. The findings of this research contribute to a better understanding of how inspectors can enhance the efficacy of their regulatory interactions to improve compliance with legislation. Encouraging and assisting compliance through effective non-punitive activity offers a sustainable pathway for promoting safety and preventing fatalities and injuries in the construction industry.

Keywords: engagement, non-punitive approaches to compliance, positive interactions in the workplace, work health and safety compliance

Procedia PDF Downloads 135
95 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare

Authors: Piret Pernik

Abstract:

Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.

Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts

Procedia PDF Downloads 84
94 Integrating Qualitative and Behavioural Insights to Increase the Take-Up of an Education Savings Program for Low Income Canadians

Authors: Mathieu Audet, Monica Soliman, Emilie Eve Gravel, Rebecca Friesdorf

Abstract:

Access to higher education is critical for reducing social inequalities. The Canada Learning Bond (CLB) is a government savings incentive aimed at increasing higher education access for children of low income families by providing money toward a Registered Education Savings Plan. To better understand the educational and financial decision-making of low income families, Employment Social Development Canada conducted qualitative fieldwork with eligible parents and children, teachers, and community organizations promoting the Bond. Insights from this fieldwork were then used to develop letters to better target the needs and experiences of eligible families. In the present study, we conducted a randomized controlled trial with children ages 12 to 13, the oldest cohort of eligible children, to test the effectiveness of the new letters. Parents or caregivers of 150,088 eligible children were assigned to one of five letter conditions promoting the Bond or to a control condition that did not receive a letter. The letter conditions were: (a) the standard letter from past outreach, (b) a letter presenting the exact amount the child was eligible to receive, enhancing the salience of benefits, (c) a letter with a social norm, (d) a letter with an image emphasizing the feasibility of higher education by presenting the diversity of options (i.e., college, trade schools, apprenticeships) – many participants interviewed viewed that university was unfeasible, and (e) a letter minimizing references to 'saving' (i.e., not framing the Bond explicitly as a savings incentive) – a concept that did not resonate with low income families who felt they could not afford to save. The exact amount was also presented in letters (c) through (e). The letter minimizing references to 'saving' and presenting the exact amount had the highest net take-up rate at 6.6%, compared to 3.5% for the standard letter group. Furthermore, this trial’s BI-informed letters showed the largest impact on take-up so far, with a net take-up of 5.7% compared to 3.0% and 3.9% in the first two trials. This research highlights the value of mixed-method approaches combining qualitative and behavioural insights methods for developing context-sensitive interventions for social programs. By gaining a deeper understanding of the needs and experiences of program users through qualitative fieldwork, and then integrating these insights into behaviourally informed communications, we were able to increase take-up of an education savings program, which may ultimately improve access to higher education in children of low income families.

Keywords: access to higher education, behavioral insights, government, innovation, mixed-methods, social programs

Procedia PDF Downloads 109
93 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 82
92 The Effects of Self-Reflections on Intercultural Communication Competency: A Case Study of the University of Arkansas-Fort Smith

Authors: JaeYoon Park

Abstract:

The ability to communicate effectively across different cultures is a necessary skill in today’s increasingly globalized world. Intercultural communication competency (ICC) is a way of being that benefits all members of a society in their living, learning, and working environments as well as in the context of mediated communications. This study examines the effects of self-reflection processes on the improvement of intercultural communication skills focusing on college students at the University of Arkansas-Fort Smith. A total of sixty-nine students’ works were analyzed based on the data collected in the past three years (2016, 2017 and 2018). The students in the ‘Culture and Communication’ class, each spring, completed the Diversity Awareness Profile (DAP) survey as a pre- and post-test for the course. DAP is a self-assessment tool designed by Karen Stinson and widely used in college classes, companies, and organizations to evaluate an individual’s behaviors in various intercultural settings. It can assist individuals in becoming more aware of diversity issues and also provide a foundation for developing strategies for modifying any undesirable behavior they may discover in the assessment. In addition to the DAP surveys, the students also submitted self-reflection essays that discussed their own scores. The University of Arkansas-Fort Smith is a small regional university located in the Bible Belt of the United States. White, Christian, working-class students dominate its student population. The students, whose data were collected, were predominantly seniors in college majoring in either Media Communication or International Business. Approximately, 80% of the students increased their scores, and 42% of them moved forward to a new category. The findings also indicate that the students in the underrepresented groups (i.e., women, minority, and international students) show less change in their scores and behaviors than the rest of the students (i.e., white heterosexual male students). These findings, in most part, result from the fact that the underrepresented students were already aware of diversity and intercultural issues through their personal experiences before taking the class. The white heterosexual male students demonstrated the greatest improvements, judging from their DAP scores (pre- and post-tests) and self-reflection essays. Through the class assignments and discussions, which emphasized critical thinking and self-reflection, the latter group of students not only became more aware of the meaning of their own words and behaviors, but they were also able to develop greater proficiency in intercultural communication. This e-poster presentation will analyze the findings of this research data, and also discuss the pedagogical implications of such results.

Keywords: cross-cultural communication, diversity awareness survey, self-reflection, underrepresented students

Procedia PDF Downloads 111
91 The Interrelation of Institutional Care and Successful Aging

Authors: Naphaporn Sapsopha

Abstract:

Aging population has been growing rapidly in Thailand due to several factors – namely, the declining size of the average Thai family, changing family structure, higher survival rates of women, and job migration patterns – there are fewer working-age citizens who are able to care for and support their aging family members. When a family can no longer provide for their elders, the responsibility shifts to the government. Many non-profit institutional care facilities for older adults have already been established, but having such institutions are not enough. In addition to the provisions that a reliable shelter can provide, older adults also need efficient social services, physical wellness, and mental health, all of which are crucial for successful aging. Yet, to date, there is no consensus or a well-accepted definition of what constitutes successful aging. The issue is further complicated by cultural expectations, and the gendered experience of the older adults. These issues need to be better understood to promote effective care and wellness. This qualitative research investigates the relationship between institutional care and successful aging among the institutionalized Thai older adults at a non-profit facility in Bangkok, Thailand. Specifically, it examines: a) How do institutionalized older adults define successful aging?, b) What factors do they believe contribute to successful aging?, and c) Do their beliefs vary by gender? Data was collected using a phenomenological research approach that included focus groups and in-depth interviews using open-ended questions, conducted on 10 institutionalized older adults (5 men and 5 women) ages 60 or over. Interview transcripts were coded and analyzed using grounded theory methodology. The participants aged between 70-91 years old, and they varied in terms of gender, education, occupation, and life background. The results revealed that Thai institutionalized older adults viewed successful aging as a result of multiple interrelated factors: maintaining physical health, good mental and cognitive abilities. Remarkably, the participants identified as successful aging include independence for self-care and financial support, adhering to moral principles and religious practice, seeing the success of their loved ones, and making social contributions to their community. In addition, three primary themes were identified as a coping strategy to age successfully: self-acceptance by being sufficient and satisfied with all aspects of life, preparedness and adaptation for every stage of life, and self-esteem by maintaining their self. These beliefs are shared across gender and age differences. However, participants highlighted the importance of the interrelationship among these attributes similar to the need for a secure environment, the thoughtfulness and social support of institutional care in order to maintain positive attitude and well-being. With highly increased Thai aging population, many of these older adults will find themselves living in the institutional care; therefore, it is important to intensively understand how older adults viewed successful aging, what constituted successful aging and what could be done to promote it. Interventions to enhance successful aging may include meaningful practice and along with an effective coping strategy in order to lead a better quality of life those living in institutional care.

Keywords: institutional care, older adults, self-acceptant, successful aging

Procedia PDF Downloads 301
90 Iranian English as Foreign Language Teachers' Psychological Well-Being across Gender: During the Pandemic

Authors: Fatemeh Asadi Farsad, Sima Modirkhameneh

Abstract:

The purpose of this study was to explore the pattern of Psychological Well-Being (PWB) of Iranian male and female EFL teachers during the pandemic. It was intended to see if such a drastic change in the context and mode of teaching affects teachers' PWB. Furthermore, the possible difference between the six elements of PWB of Iranian EFL male vs. female teachers during the pandemic was investigated. The other purpose was to find out the EFL teachers’ perceptions of any modifications, and factors leading to such modifications in their PWB during pandemic. For the purpose of this investigation, a total of 81 EFL teachers (59 female, 22 male) with an age range of 25 to 35 were conveniently sampled from different cities in Iran. Ryff’s PWB questionnaire was sent to participant teachers through online platforms to elicit data on their PWB. As for their perceptions on the possible modifications and the factors involved in PWB during pandemic, a set of semi-structured interviews were run among both sample groups. The findings revealed that male EFL teachers had the highest mean on personal growth, followed by purpose of life, and self-acceptance and the lowest mean on environmental mastery. With a slightly similar pattern, female EFL teachers had the highest mean on personal growth, followed by purpose in life, and positive relationship with others with the lowest mean on environmental mastery. However, no significant difference was observed between the male and female groups’ overall means on elements of PWB. Additionally, participants perceived that their anxiety level in online classes altered due to factors like (1) Computer literacy skills, (2) Lack of social communications and interactions with colleagues and students, (3) Online class management, (4) Overwhelming workloads, and (5) Time management. The study ends with further suggestions as regards effective online teaching preparation considering teachers PWB, especially at severe situations such as covid-19 pandemic. The findings offer to determine the reformations of educational policies concerning enhancing EFL teachers’ PWB through computer literacy courses and stress management courses. It is also suggested that to proactively support teachers’ mental health, it is necessary to provide them with advisors and psychologists if possible for free. Limitations: One limitation is the small number of participants (81), suggesting that future replications should include more participants for reliable findings. Another limitation is the gender imbalance, which future studies should address to yield better outcomes. Furthermore, Limited data gathering tools suggest using observations, diaries, and narratives for more insights in future studies. The study focused on one model of PWB, calling for further research on other models in the literature. Considering the wide effect of the COVID-19 pandemic, future studies should consider additional variables (e.g., teaching experience, age, income) to understand Iranian EFL teachers’ vulnerabilities and strengths better.

Keywords: online teaching, psychological well-being, female and male EFL teachers, pandemic

Procedia PDF Downloads 36
89 Thermal Securing of Electrical Contacts inside Oil Power Transformers

Authors: Ioan Rusu

Abstract:

In the operation of power transformers of 110 kV/MV from substations, these are traveled by fault current resulting from MV line damage. Defect electrical contacts are heated when they are travelled from fault currents. In the case of high temperatures when 135 °C is reached, the electrical insulating oil in the vicinity of the electrical faults comes into contact with these contacts releases gases, and activates the electrical protection. To avoid auto-flammability of electro-insulating oil, we designed a security system thermal of electrical contact defects by pouring fire-resistant polyurethane foam, mastic or mortar fire inside a cardboard electro-insulating cylinder. From practical experience, in the exploitation of power transformers of 110 kV/MT in oil electro-insulating were recorded some passing disconnecting commanded by the gas protection at internal defects. In normal operation and in the optimal load, nominal currents do not require thermal secure contacts inside electrical transformers, contacts are made at the fabrication according to the projects or to repair by solder. In the case of external short circuits close to the substation, the contacts inside electrical transformers, even if they are well made in sizes of Rcontact = 10‑6 Ω, are subjected to short-circuit currents of the order of 10 kA-20 kA which lead to the dissipation of some significant second-order electric powers, 100 W-400 W, on contact. At some internal or external factors which action on electrical contacts, including electrodynamic efforts at short-circuits, these factors could be degraded over time to values in the range of 10-4 Ω to 10-5 Ω and if the action time of protection is great, on the order of seconds, power dissipation on electrical contacts achieve high values of 1,0 kW to 40,0 kW. This power leads to strong local heating, hundreds of degrees Celsius and can initiate self-ignition and burning oil in the vicinity of electro-insulating contacts with action the gas relay. Degradation of electrical contacts inside power transformers may not be limited for the duration of their operation. In order to avoid oil burn with gas release near electrical contacts, at short-circuit currents 10 kA-20 kA, we have outlined the following solutions: covering electrical contacts in fireproof materials that would avoid direct burn oil at short circuit and transmission of heat from electrical contact along the conductors with heat dissipation gradually over time, in a large volume of cooling. Flame retardant materials are: polyurethane foam, mastic, cement (concrete). In the normal condition of operation of transformer, insulating of conductors coils is with paper and insulating oil. Ignition points of its two components respectively are approximated: 135 °C heat for oil and 200 0C for paper. In the case of a faulty electrical contact, about 10-3 Ω, at short-circuit; the temperature can reach for a short time, a value of 300 °C-400 °C, which ignite the paper and also the oil. By burning oil, there are local gases that disconnect the power transformer. Securing thermal electrical contacts inside the transformer, in cardboard tube with polyurethane foams, mastik or cement, ensures avoiding gas release and also gas protection working.

Keywords: power transformer, oil insulatation, electric contacts, Bucholtz relay

Procedia PDF Downloads 142
88 The Relationship Between Teachers’ Attachment Insecurity and Their Classroom Management Efficacy

Authors: Amber Hatch, Eric Wright, Feihong Wang

Abstract:

Research suggests that attachment in close relationships affects one’s emotional processes, mindfulness, conflict-management behaviors, and interpersonal interactions. Attachment insecurity is often associated with maladaptive social interactions and suboptimal relationship qualities. Past studies have considered how the nature of emotion regulation and mindfulness in teachers may be related to student or classroom outcomes. Still, no research has examined how the relationship between such internal experiences and classroom management outcomes may also be related to teachers’ attachment insecurity. This study examined the interrelationships between teachers’ attachment insecurity, mindfulness tendencies, emotion regulation abilities, and classroom management efficacy as indexed by students’ classroom behavior and teachers’ response effectiveness. Teachers’ attachment insecurity was evaluated using the global ECRS-SF, which measures both attachment anxiety and avoidance. The present study includes a convenient sample of 357 American elementary school teachers who responded to a survey regarding their classroom management efficacy, attachment in/security, dispositional mindfulness, emotion regulation strategies, and difficulties in emotion regulation, primarily assessed via pre-existing instruments. Good construct validity was demonstrated for all scales used in the survey. Sample demographics, including gender (94% female), race (92% White), age (M = 41.9 yrs.), years of teaching experience (M = 15.2 yrs.), and education level were similar to the population from which it was drawn, (i.e., American elementary school teachers). However, white women were slightly overrepresented in our sample. Correlational results suggest that teacher attachment insecurity is associated with poorer classroom management efficacy as indexed by students’ disruptive behavior and teachers’ response effectiveness. Attachment anxiety was a much stronger predictor of adverse student behaviors and ineffective teacher responses to adverse behaviors than attachment avoidance. Mindfulness, emotion regulation abilities, and years of teaching experience predicted positive classroom management outcomes. Attachment insecurity and mindfulness were more strongly related to frequent adverse student behaviors, while emotion regulation abilities were more strongly related to teachers’ response effectiveness. The teaching experience was negatively related to attachment insecurity and positively related to mindfulness and emotion regulation abilities. Although the data were cross-sectional, path analyses revealed that attachment insecurity is directly related to classroom management efficacy. Through two routes, this relationship is further mediated by emotion regulation and mindfulness in teachers. The first route of indirect effect suggests double mediation by teacher’s emotion regulation and then teacher mindfulness in the relationship between teacher attachment insecurity and classroom management efficacy. The second indirect effect suggests mindfulness directly mediated the relationship between attachment insecurity and classroom management efficacy, resulting in improved model fit statistics. However, this indirect effect is much smaller than the double mediation route through emotion regulation and mindfulness in teachers. Given the significant predication of teacher attachment insecurity, mindfulness, and emotion regulation on teachers’ classroom management efficacy both directly and indirectly, the authors recommend improving teachers’ classroom management efficacy via a three-pronged approach aiming at enhancing teachers’ secure attachment and supporting their learning adaptive emotion regulation strategies and mindfulness techniques.

Keywords: Classroom management efficacy, student behavior, teacher attachment, teacher emotion regulation, teacher mindfulness

Procedia PDF Downloads 70
87 Engineers 'Write' Job Description: Development of English for Specific Purposes (ESP)-Based Instructional Materials for Engineering Students

Authors: Marjorie Miguel

Abstract:

Globalization offers better career opportunities hence demands more competent professionals efficient for the job. With the transformation of the world industry from competition to collaboration coupled with the rapid development in the field of science and technology, engineers need not only to be technically proficient, but also multilingual-skilled: two characteristics that a global engineer possesses. English often serves as the global language between people from different cultures being the medium mostly used in international business. Ironically, most universities worldwide adapt engineering curriculum heavily built around the language of mathematics not realizing that the goal of an engineer is not only to create and design, but more importantly to promote his creations and designs to the general public through effective communication. This premise led to some developments in the teaching process of English subjects in the tertiary level which include the integration of the technical knowledge related to the area of specialization of the students in the English subjects that they are taking. This is also known as English for Specific Purposes. This study focused on the development of English for Specific Purposes-Based Instructional Materials for Engineering Students of Bulacan State University (BulSU). The materials were tailor-made in which the contents and structure were designed to meet the specific needs of the students as well as the industry. Based on the needs analysis, the needs of the students and the industry were determined to make the study descriptive in nature. The major respondents included fifty engineering students and ten professional engineers from selected institutions. The needs analysis was done and the results showed the common writing difficulties of the students and the writing skills needed among the engineers in the industry. The topics in the instructional materials were established after the needs analysis was conducted. Simple statistical treatment including frequency distribution, percentages, mean, standard deviation, and weighted mean were used. The findings showed that the greatest number of the respondents had an average proficiency rating in writing, and the much-needed skills that must be developed by the engineers are directly related to the preparation and presentation of technical reports about their projects, as well as to the different communications they transmit to their colleagues and superiors. The researcher undertook the following phases in the development of the instructional materials: a design phase, development phase, and evaluation phase. Evaluations are given by some college instructors about the instructional materials generally helped in its usefulness and significance making the study beneficial not only as a career enhancer for BulSU engineering students, but also creating the university one of the educational institutions ready for the new millennium.

Keywords: English for specific purposes, instructional materials, needs analysis, write (right) job description

Procedia PDF Downloads 225
86 Struggles of Non-Binary People in an Organizational Setting in Iceland

Authors: Kevin Henry

Abstract:

Introduction: This research identifies the main struggles of non-binary people in an organizational setting using the ZMET – method of in-depth interviews. The research was done in Iceland, a country that is repeatedly listed in the top countries for gender equality and found three main categories of non-binary struggles in organizations. These categories can be used to improve organizational non-binary inclusion. Aim: The main questions this paper will answer are: Which unique obstacles are non-binary people facing in their daily organizational life? Which organizational and individual measures help with more inclusion of non-binary people? How can organizational gender equality measures be made more inclusive of non-binary issues? Background: Even though gender equality is a much-researched topic, the struggles of non-binary people are often overlooked in gender equality research. Additionally, non-binary and transgender people are frequently researched together, even though their struggles can be very different. Research focused on non-binary people is, in many cases, done on a more structural or organizational level with quantitative data such as salary or position within an organization. This research focuses on the individual and their struggles with qualitative data to derive measures for non-binary inclusion and equality. Method: An adapted approach of the ZMET-Method (Zaltman Metaphor Elicitation Technique) will be used, during which in-depth interviews are held with individuals, utilizing pictures as a metaphorical starting point to discuss their main thoughts and feelings on being non-binary in an organizational setting. Interviewees prepared five pictures, each representing one key thought or feeling about their organizational life. The interviewer then lets the interviewee describe each picture and asks probing questions to get a deeper understanding of each individual topic. This method helps with a mostly unbiased data collection process by only asking probing questions during the interview and not leading the interviewee in any certain direction. Results: This research has identified three main categories of struggles non-binary people are facing in an organizational setting: internal (personal) struggles, external struggles and structural struggles. Internal struggles refer to struggles that originate from the person themselves (e.g., struggles with their own identity). External struggles refer to struggles from the outside (e.g. harassment from coworkers, exclusion). Structural struggles refer to struggles that are built into the organizational policy or facilities (e.g. restrooms, gendered language). Conclusion: This study shows that there are many struggles for non-binary people in organizations and that even in countries that pride themselves on being progressive and having a high level of gender equality, there is still much to be done for non-binary inclusion. Implications for Organizations: Organizations that strive to improve the inclusion of all genders should pay attention to how their structures are built, how their training is conducted, and how their policies affect people of various genders. Simple changes like making restrooms gender-neutral and using neutral language in company communications are good examples of small structural steps for more inclusion.

Keywords: gender equality, non-binary, organizations, ZMET

Procedia PDF Downloads 22
85 Working From Home: On the Relationship Between Place Attachment to Work Place, Extraversion and Segmentation Preference to Burnout

Authors: Diamant Irene, Shklarnik Batya

Abstract:

In on to its widespread effects on health and economic issues, Covid-19 shook the work and employment world. Among the prominent changes during the pandemic is the work-from-home trend, complete or partial, as part of social distancing. In fact, these changes accelerated an existing tendency of work flexibility already underway before the pandemic. Technology and means of advanced communications led to a re-assessment of “place of work” as a physical space in which work takes place. Today workers can remotely carry out meetings, manage projects, work in groups, and different research studies point to the fact that this type of work has no adverse effect on productivity. However, from the worker’s perspective, despite numerous advantages associated with work from home, such as convenience, flexibility, and autonomy, various drawbacks have been identified such as loneliness, reduction of commitment, home-work boundary erosion, all risk factors relating to the quality of life and burnout. Thus, a real need has arisen in exploring differences in work-from-home experiences and understanding the relationship between psychological characteristics and the prevalence of burnout. This understanding may be of significant value to organizations considering a future hybrid work model combining in-office and remote working. Based on Hobfoll’s Theory of Conservation of Resources, we hypothesized that burnout would mainly be found among workers whose physical remoteness from the workplace threatens or hinders their ability to retain significant individual resources. In the present study, we compared fully remote and partially remote workers (hybrid work), and we examined psychological characteristics and their connection to the formation of burnout. Based on the conceptualization of Place Attachment as the cognitive-emotional bond of an individual to a meaningful place and the need to maintain closeness to it, we assumed that individuals characterized with Place Attachment to the workplace would suffer more from burnout when working from home. We also assumed that extrovert individuals, characterized by the need of social interaction at the workplace and individuals with segmentationpreference – a need for separation between different life domains, would suffer more from burnout, especially among fully remote workers relative to partially remote workers. 194 workers, of which 111 worked from home in full and 83 worked partially from home, aged 19-53, from different sectors, were tested using an online questionnaire through social media. The results of the study supported our assumptions. The repercussions of these findings are discussed, relating to future occupational experience, with an emphasis on suitable occupational adjustment according to the psychological characteristics and needs of workers.

Keywords: working from home, burnout, place attachment, extraversion, segmentation preference, Covid-19

Procedia PDF Downloads 173
84 Modern Detection and Description Methods for Natural Plants Recognition

Authors: Masoud Fathi Kazerouni, Jens Schlemper, Klaus-Dieter Kuhnert

Abstract:

Green planet is one of the Earth’s names which is known as a terrestrial planet and also can be named the fifth largest planet of the solar system as another scientific interpretation. Plants do not have a constant and steady distribution all around the world, and even plant species’ variations are not the same in one specific region. Presence of plants is not only limited to one field like botany; they exist in different fields such as literature and mythology and they hold useful and inestimable historical records. No one can imagine the world without oxygen which is produced mostly by plants. Their influences become more manifest since no other live species can exist on earth without plants as they form the basic food staples too. Regulation of water cycle and oxygen production are the other roles of plants. The roles affect environment and climate. Plants are the main components of agricultural activities. Many countries benefit from these activities. Therefore, plants have impacts on political and economic situations and future of countries. Due to importance of plants and their roles, study of plants is essential in various fields. Consideration of their different applications leads to focus on details of them too. Automatic recognition of plants is a novel field to contribute other researches and future of studies. Moreover, plants can survive their life in different places and regions by means of adaptations. Therefore, adaptations are their special factors to help them in hard life situations. Weather condition is one of the parameters which affect plants life and their existence in one area. Recognition of plants in different weather conditions is a new window of research in the field. Only natural images are usable to consider weather conditions as new factors. Thus, it will be a generalized and useful system. In order to have a general system, distance from the camera to plants is considered as another factor. The other considered factor is change of light intensity in environment as it changes during the day. Adding these factors leads to a huge challenge to invent an accurate and secure system. Development of an efficient plant recognition system is essential and effective. One important component of plant is leaf which can be used to implement automatic systems for plant recognition without any human interface and interaction. Due to the nature of used images, characteristic investigation of plants is done. Leaves of plants are the first characteristics to select as trusty parts. Four different plant species are specified for the goal to classify them with an accurate system. The current paper is devoted to principal directions of the proposed methods and implemented system, image dataset, and results. The procedure of algorithm and classification is explained in details. First steps, feature detection and description of visual information, are outperformed by using Scale invariant feature transform (SIFT), HARRIS-SIFT, and FAST-SIFT methods. The accuracy of the implemented methods is computed. In addition to comparison, robustness and efficiency of results in different conditions are investigated and explained.

Keywords: SIFT combination, feature extraction, feature detection, natural images, natural plant recognition, HARRIS-SIFT, FAST-SIFT

Procedia PDF Downloads 256
83 Teaching of Entrepreneurship and Innovation in Brazilian Universities

Authors: Marcelo T. Okano, Oduvaldo Vendrametto, Osmildo S. Santos, Marcelo E. Fernandes, Heide Landi

Abstract:

Teaching of entrepreneurship and innovation in Brazilian universities has increased in recent years due to several factors such as the emergence of disciplines like biotechnology increased globalization reduced basic funding and new perspectives on the role of the university in the system of knowledge production Innovation is increasingly seen as an evolutionary process that involves different institutional spheres or sectors in society Entrepreneurship is a milestone on the road towards economic progress, and makes a huge contribution towards the quality and future hopes of a sector, economy or even a country. Entrepreneurship is as important in small and medium-sized enterprises (SMEs) and local markets as in large companies, and national and international markets, and is just as key a consideration for public companies as or private organizations. Entrepreneurship helps to encourage the competition in the current environment that leads to the effects of globalization. There is an increasing tendency for government policy to promote entrepreneurship for its apparent economic benefit. Accordingly, governments seek to employ entrepreneurship education as a means to stimulate increased levels of economic activity. Entrepreneurship education and training (EET) is growing rapidly in universities and colleges throughout the world, and governments are supporting it both directly and through funding major investments in advice-provision to would-be entrepreneurs and existing small businesses. The Triple Helix of university–industry–government relations is compared with alternative models for explaining the current research system in its social contexts. Communications and negotiations between institutional partners generate an overlay that increasingly reorganizes the underlying arrangements. To achieve the objective of this research was a survey of the literature on the entrepreneurship and innovation and then a field research with 100 students of Fatec. To collect the data needed for analysis, we used the exploratory research of a qualitative nature. We asked to respondents what degree of knowledge over ten related to entrepreneurship and innovation topics, responses were answered in a Likert scale with 4 levels, none, small, medium and large. We can conclude that the terms such as entrepreneurship and innovation are known by most students because the university propagates them across disciplines, lectures, and institutes innovation. The more specific items such as canvas and Design thinking model are unknown by most respondents. The importance of the University in teaching innovation and entrepreneurship in the transmission of this knowledge to the students in order to equalize the knowledge. As a future project, these items will be re-evaluated to create indicators for measuring the knowledge level.

Keywords: Brazilian universities, entrepreneurship, innovation, entrepreneurship, globalization

Procedia PDF Downloads 489
82 On the Limits of Board Diversity: Impact of Network Effect on Director Appointments

Authors: Vijay Marisetty, Poonam Singh

Abstract:

Research on the effect of director's network connections on investor welfare is inconclusive. Some studies suggest that directors' connections are beneficial, in terms of, improving earnings information, firms valuation for new investors. On the other hand, adverse effects of directorial networks are also reported, in terms of higher earnings management, options back dating fraud, reduction in firm performance, lower board monitoring. From regulatory perspective, the role of directorial networks on corporate welfare is crucial. Cognizant of the possible ill effects associated with directorial networks, large investors, for better representation on the boards, are building their own database of prospective directors who are highly qualified, however, sourced from outside the highly connected directorial labor market. For instance, following Dodd-Frank Reform Act, California Public Employees' Retirement Systems (CalPERs) has initiated a database for registering aspiring and highly qualified directors to nominate them for board seats (proxy access). Our paper stems from this background and tries to explore the chances of outside directors getting directorships who lack established network connections. The paper is able to identify such aspiring directors' information by accessing a unique Indian data sourced from an online portal that aims to match the supply of registered aspirants with the growing demand for outside directors in India. The online portal's tie-up with stock exchanges ensures firms to access the new pool of directors. Such direct access to the background details of aspiring directors over a period of 10 years, allows us to examine the chances of aspiring directors without corporate network, to enter directorial network. Using this resume data of 16105 aspiring corporate directors in India, who have no prior board experience in the directorial labor market, the paper analyses the entry dynamics in corporate directors' labor market. The database also allows us to investigate the value of corporate network by comparing non-network new entrants with incumbent networked directors. The study develops measures of network centrality and network degree based on merit, i.e. network of individuals belonging to elite educational institutions, like Indian Institute of Management (IIM) or Indian Institute of Technology (IIT) and based on job or company, i.e. network of individuals serving in the same company. The paper then measures the impact of these networks on the appointment of first time directors and subsequent appointment of directors. The paper reports the following main results: 1. The likelihood of becoming a corporate director, without corporate network strength, is only 1 out 100 aspirants. This is inspite of comparable educational background and similar duration of corporate experience; 2. Aspiring non-network directors' elite educational ties help them to secure directorships. However, for post-board appointments, their newly acquired corporate network strength overtakes as their main determinant for subsequent board appointments and compensation. The results thus highlight the limitations in increasing board diversity.

Keywords: aspiring corporate directors, board diversity, director labor market, director networks

Procedia PDF Downloads 294
81 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 47